نتایج جستجو برای: despite its long
تعداد نتایج: 2792616 فیلتر نتایج به سال:
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of (bad) IDs to a minority is critical for tolerating malicious behavior. popular tool enforcing bad resource burning (RB): verifiable consumption network resource. Unfortunately, typical RB defenses require non-Sybil (good) consume at least as many resources adversary. We present new defense...
The seemingly unrelated Poisson (SUP) model (King (1989a), see also Aptech (1994)) is a model for bior multi-variate counted outcomes. Correlation between equations is introduced through a convolution structure with a common additive factor. Previous economic applications include the joint analysis of voluntary and involuntary labour mobility (Jung and Winkelmann, 1993) and the number of recrea...
Ergin Dilekoz,1* Thijs Houben,1,2* Katharina Eikermann-Haerter,1 Mustafa Balkaya,1 A. Mariette Lenselink,4 Michael J. Whalen,5 Sabine Spijker,4 Michel D. Ferrari,2 Arn M.J.M. van den Maagdenberg,2,3 and Cenk Ayata1,6 1Neurovascular Research Laboratory, Department of Radiology, Massachusetts General Hospital, Harvard Medical School, Charlestown, Massachusetts 02129, Departments of 2Neurology and...
OBJECTIVE Candida esophagitis belongs to the most common AIDS-defining diseases; however, a comprehensive immune pathogenic concept is lacking. DESIGN We investigated the immune status of 37 HIV-1-infected patients from the Swiss HIV cohort study at diagnosis of Candida esophagitis, 1 year before, 1 year later and after 2 years of suppressed HIV RNA. We compared these patients with three grou...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید